跳到主要內容

簡易檢索 / 詳目顯示

研究生: 鄭國平
Cheng, Kuo Ping
論文名稱: 雲端委外語意式資料保護
Protection of Outsourcing Semantic Data in the Clou
指導教授: 胡毓忠
Hu, Yuh Jong
學位類別: 碩士
Master
系所名稱: 理學院 - 資訊科學系
論文出版年: 2013
畢業學年度: 101
語文別: 中文
論文頁數: 56
中文關鍵詞: 本體論規則語言信賴虛擬域統計式揭露控管
外文關鍵詞: Ontology, Rule Language, Trusted Virtual Domain, Statistical Disclosure Control
相關次數: 點閱:93下載:11
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 企業基於業務需求會蒐集大量的個人資料。近來,企業基於成本考量往往會將資料委外儲存到雲端資料庫服務中,並自行建置資料查詢介面給使用者。但將資料委外到雲端資料庫服務中,雲端資料庫服務提供者便可能侵犯資料擁有者隱私。此外,資料查詢介面也必須根據不同使用情境提供不同揭露程度的資料給使用者,像是基於診療目的的醫生應該使用完整的資料,而醫療研究人員便只能使用匿名處理的資料。如何根據使用情境提供不同揭露程度的資料來確保資料使用上的隱私保護是一個重要的議題。
    本研究將探討結構化單一資料源的資料委外和委外資料使用時的隱私保護,藉由在資料委外前以加密結合分割的方式處理資料,以及運用OWL本體論和LP規則語言設計三種規範:Access Control Policy (ACP)、Data Handling Policy (DHP)和Data Releasing Policy (DRP),並且以規則語言來落實規範。透過這三種規範的合作和分工來提供揭露程度不同的資料確保資料委外和使用上的隱私保護。


    Enterprise collects a great amount of personal identifiable information (PII) for business service. Recently, these PII data are outsourced for Database-as-a-Service (DaaS) in the cloud to reduce the enterprise's data administration cost. However, this might provide an opportunity for cloud service providers (CSPs) to infringe data owners' privacy. In addition, a data controller of enterprise should provide an interface for data users with different level of data usage based on its access context. For example, a doctor can use a patient's complete PII when (s)he performs the medication practice. On the other hand, a researcher for medical analysis can only use de-identifiable PII. Therefore, the research challenge is to ensure how privacy protection criteria are satisfied for various data disclosure when using associated data usage context.
    In this study, we address the research problem for outsourcing data protection from a single data source in the cloud. We apply encryption and fragmentation techniques for these outsourcing data to avoid privacy violation risk from CSPs. Furthermore, we use OWL-based ontologies to represent there types of data protection policies, i.e., Access Control Policy (ACP), Data Handling Policy (DHP), and Data Releasing Policy (DRP). In addition, we use Logic-Program (LP) rules to enforce these policies. Finally, through integration and collaboration of these policies, we ensure the satisfaction of privacy protection criteria and achieve different level of outsourcing data disclosure in the cloud.

    目錄 6
    圖目錄 8
    表目錄 9
    第1章 10
    1.1 研究動機 10
    1.2 研究目的 11
    1.3 各章節概述 12
    第2章 13
    2.1 資料揭露的隱私風險 13
    2.2 雲端環境的安全保護 14
    2.3 資料委外的隱私保護 15
    2.4 本體論與規則語言 16
    2.5 資料整合 17
    第3章 19
    3.1 隱私導向的存取控管系統 19
    3.2 委外資料的查詢 20
    3.3 企業隱私授權語言 22
    第4章 23
    4.1 研究架構設計 23
    4.2 資料委外 26
    4.2.1 委外資料的保護方式 26
    4.2.2 資料委外保護 28
    4.2.3 資料委外模式 30
    4.3 規範的設計和資料查詢處理 31
    4.3.1 研究情境說明 32
    4.3.2 Access Control Policy 32
    4.3.3 Data Handling Policy 36
    4.3.4 資料查詢處理 39
    4.3.5 Data Releasing Policy 41
    第5章 47
    5.1 規範推論的驗證 47
    5.2 系統展示 49
    第6章 53
    參考文獻 54

    [1] H. Hakan, "Providing Database as a Service," 2002, pp. 0029-0029.
    [2] M. Armbrust, A. Fox, et al., "Above the Clouds: A Berkeley View of Cloud Computing," EECS Department, University of California, Berkeley UCB/EECS-2009-28, February 10 2009.
    [3] H. Takabi, J. B. D. Joshi, et al., "Security and Privacy Challenges in Cloud Computing Environments," IEEE Security and Privacy, vol. 8, pp. 24-31, 2010.
    [4] P. Samarati and S. D. C. d. Vimercati, "Data protection in outsourcing scenarios: issues and directions," Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, Beijing, China, 2010.
    [5] V. Ciriani, S. Capitani di Vimercati, et al., "Microdata Protection," in Secure Data Management in Decentralized Systems. vol. 33, 2007, pp. 291-321.
    [6] L. Sweeney, "k-anonymity: a model for protecting privacy," Int. J. Uncertain. Fuzziness Knowl.-Based Syst., vol. 10, pp. 557-570, 2002.
    [7] R. Popp and J. Poindexter, "Countering Terrorism through Information and Privacy Protection Technologies," IEEE Security and Privacy, vol. 4, pp. 18-27, 2006.
    [8] OpenTC. Available: http://www.opentc.net/
    [9] S. Cabuk, C. I. Dalton, et al., "Towards automated security policy enforcement in multi-tenant virtual data centers," Journal of Computer Security, vol. 18, pp. 89-121, 2010.
    [10] S. Berger, R. C, et al., "Security for the cloud infrastructure: trusted virtual data center implementation," IBM J. Res. Dev., vol. 53, pp. 560-571, 2009.
    [11] California Senate Bill SB 1386, 2002.
    [12] SWRL: A Semantic Web Rule Language Combining OWL and RuleML. Available: http://www.w3.org/Submission/SWRL/
    [13] Connor, M. O. and A. Das (2009). "SQWRL: a Query Language for OWL." Proceedings of the 6th International Workshop on OWL: Experiences and Directions (OWLED 2009).
    [14] D. Calvanese and G. D. Giacomo, "Data integration: a logic-based perspective," AI Mag., vol. 26, pp. 59-70, 2005.
    [15] D. Calvanese, G. Giacomo, et al., "Data Integration through DL-Lite A Ontologies," in Semantics in Data and Knowledge Bases, 2008, pp. 26-47.
    [16] D. Calvanese, G. Giacomo, et al., "Using OWL in Data Integration," in Semantic Web Information Management, 2010, pp. 397-424.
    [17] A. Y. Levy, A. Rajaraman, et al., "Querying Heterogeneous Information Sources Using Source Descriptions," Proceedings of the 22th International Conference on Very Large Data Bases, 1996.
    [18] C. A. Ardagna, M. Cremonini, et al., "A privacy-aware access control system," J. Comput. Secur., vol. 16, pp. 369-397, 2008.
    [19] C. A. Ardagna, J. Camenisch, et al., "Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project," J. Comput. Secur., vol. 18, pp. 123-160, 2010.
    [20] The Enterprise Privacy Authorization Language(EPAL). Available: http://www.w3.org/2003/p3p-ws/pp/ibm3.html
    [21] S. De Capitani di Vimercati and S. Foresti, "Privacy of Outsourced
    Data Privacy and Identity Management for Life." vol. 320, 2010, pp. 174-187.
    [22] V. Ciriani, S. De Capitani di Vimercati, et al., "Keep a Few: Outsourcing Data While Maintaining Confidentiality Computer Security – ESORICS 2009." vol. 5789, 2009, pp. 440-455.
    [23] V. Ciriani, S. D. C. D. Vimercati, et al., "Combining fragmentation and encryption to protect privacy in data storage," ACM Trans. Inf. Syst. Secur., vol. 13, pp. 1-33, 2010.
    [24] S. Ceri, G. Gottlob, et al., "What You Always Wanted to Know About Datalog (And Never Dared to Ask)," IEEE Trans. on Knowl. and Data Eng., vol. 1, pp. 146-166, 1989.
    [25] N. R. Adam and J. C. Worthmann, "Security-control methods for statistical databases: a comparative study," ACM Comput. Surv., vol. 21, pp. 515-556, 1989.
    [26] J. Mateo-Sanz, A. Martínez-Ballesté, et al., "Fast Generation of Accurate Synthetic Microdata," in Privacy in Statistical Databases. vol. 3050, 2004, pp. 298-306.
    [27] M. Lenzerini, "Ontology-based data management," Proceedings of the 20th ACM international conference on Information and knowledge management, Glasgow, Scotland, UK, 2011.

    QR CODE
    :::